CINXE.COM

Information Security Policy | Wingify

<!DOCTYPE html> <html lang="en-US"> <head> <meta charset="UTF-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=0"> <link rel="dns-prefetch" href="fonts.gstatic.com" /> <link rel="preconnect" href="https://static.wingify.com" /> <meta name='robots' content='index, follow, max-image-preview:large, max-snippet:-1, max-video-preview:-1' /> <style>img:is([sizes="auto" i], [sizes^="auto," i]) { contain-intrinsic-size: 3000px 1500px }</style> <meta name="google-site-verification" content="c4bhPLCsCWy366RyouuTB4DpmOCN2GKzVKfNi0MTbfA" /> <link rel="shortcut icon" href="https://wingify.com/wp-content/themes/wingify/images/favicons/favicon.ico"> <link rel="apple-touch-icon" sizes="57x57" href="https://wingify.com/wp-content/themes/wingify/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="114x114" href="https://wingify.com/wp-content/themes/wingify/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="72x72" href="https://wingify.com/wp-content/themes/wingify/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="144x144" href="https://wingify.com/wp-content/themes/wingify/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="60x60" href="https://wingify.com/wp-content/themes/wingify/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="120x120" href="https://wingify.com/wp-content/themes/wingify/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="76x76" href="https://wingify.com/wp-content/themes/wingify/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="152x152" href="https://wingify.com/wp-content/themes/wingify/images/favicons/apple-touch-icon-152x152.png"> <link rel="icon" type="image/png" href="https://wingify.com/wp-content/themes/wingify/images/favicons/favicon-196x196.png" sizes="196x196"> <link rel="icon" type="image/png" href="https://wingify.com/wp-content/themes/wingify/images/favicons/favicon-160x160.png" sizes="160x160"> <link rel="icon" type="image/png" href="https://wingify.com/wp-content/themes/wingify/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="https://wingify.com/wp-content/themes/wingify/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="icon" type="image/png" href="https://wingify.com/wp-content/themes/wingify/images/favicons/favicon-32x32.png" sizes="32x32"> <meta name="msapplication-TileColor" content="#ffffff"> <meta name="msapplication-TileImage" content="https://wingify.com/wp-content/themes/wingify/images/favicons/mstile-144x144.png"> <meta name="msapplication-config" content="https://wingify.com/wp-content/themes/wingify/images/favicons/browserconfig.xml"> <!-- This site is optimized with the Yoast SEO plugin v24.6 - https://yoast.com/wordpress/plugins/seo/ --> <title>Information Security Policy | Wingify</title> <meta name="description" content="Policies to ensure protection, use, access of assets &amp; disclosure of such information in accordance with appropriate standards, laws &amp; regulation." /> <link rel="canonical" href="https://wingify.com/information-security-policy/" /> <meta property="og:locale" content="en_US" /> <meta property="og:type" content="article" /> <meta property="og:title" content="Information Security Policy | Wingify" /> <meta property="og:description" content="Policies to ensure protection, use, access of assets &amp; disclosure of such information in accordance with appropriate standards, laws &amp; regulation." /> <meta property="og:url" content="https://wingify.com/information-security-policy/" /> <meta property="og:site_name" content="Wingify Website" /> <meta property="article:modified_time" content="2020-02-06T18:49:10+00:00" /> <meta name="twitter:card" content="summary_large_image" /> <script nonce="EROdgveJbp2AV02DIMwekXSVBNsGHVXW" type="application/ld+json" class="yoast-schema-graph">{"@context":"https://schema.org","@graph":[{"@type":"WebPage","@id":"https://wingify.com/information-security-policy/","url":"https://wingify.com/information-security-policy/","name":"Information Security Policy | Wingify","isPartOf":{"@id":"https://wingify.com/#website"},"datePublished":"2020-01-28T10:00:04+00:00","dateModified":"2020-02-06T18:49:10+00:00","description":"Policies to ensure protection, use, access of assets & disclosure of such information in accordance with appropriate standards, laws & regulation.","breadcrumb":{"@id":"https://wingify.com/information-security-policy/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https://wingify.com/information-security-policy/"]}]},{"@type":"BreadcrumbList","@id":"https://wingify.com/information-security-policy/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https://wingify.com/"},{"@type":"ListItem","position":2,"name":"Information Security policy"}]},{"@type":"WebSite","@id":"https://wingify.com/#website","url":"https://wingify.com/","name":"Wingify Website","description":"Just another VWO site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https://wingify.com/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}</script> <!-- / Yoast SEO plugin. --> <link rel='dns-prefetch' href='//research.vwo.com' /> <link rel='dns-prefetch' href='//wingify.com' /> <link rel="alternate" type="application/rss+xml" title="Wingify Website &raquo; Feed" href="https://wingify.com/feed/" /> <link rel="alternate" type="application/rss+xml" title="Wingify Website &raquo; Comments Feed" href="https://wingify.com/comments/feed/" /> <script nonce="EROdgveJbp2AV02DIMwekXSVBNsGHVXW" type="text/javascript"> /* <![CDATA[ */ window._wpemojiSettings = {"baseUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/72x72\/","ext":".png","svgUrl":"https:\/\/s.w.org\/images\/core\/emoji\/15.0.3\/svg\/","svgExt":".svg","source":{"concatemoji":"https:\/\/wingify.com\/wp-includes\/js\/wp-emoji-release.min.js?ver=6.7.2"}}; /*! This file is auto-generated */ !function(i,n){var o,s,e;function c(e){try{var t={supportTests:e,timestamp:(new Date).valueOf()};sessionStorage.setItem(o,JSON.stringify(t))}catch(e){}}function p(e,t,n){e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(t,0,0);var t=new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data),r=(e.clearRect(0,0,e.canvas.width,e.canvas.height),e.fillText(n,0,0),new Uint32Array(e.getImageData(0,0,e.canvas.width,e.canvas.height).data));return t.every(function(e,t){return e===r[t]})}function u(e,t,n){switch(t){case"flag":return n(e,"\ud83c\udff3\ufe0f\u200d\u26a7\ufe0f","\ud83c\udff3\ufe0f\u200b\u26a7\ufe0f")?!1:!n(e,"\ud83c\uddfa\ud83c\uddf3","\ud83c\uddfa\u200b\ud83c\uddf3")&&!n(e,"\ud83c\udff4\udb40\udc67\udb40\udc62\udb40\udc65\udb40\udc6e\udb40\udc67\udb40\udc7f","\ud83c\udff4\u200b\udb40\udc67\u200b\udb40\udc62\u200b\udb40\udc65\u200b\udb40\udc6e\u200b\udb40\udc67\u200b\udb40\udc7f");case"emoji":return!n(e,"\ud83d\udc26\u200d\u2b1b","\ud83d\udc26\u200b\u2b1b")}return!1}function f(e,t,n){var r="undefined"!=typeof WorkerGlobalScope&&self instanceof WorkerGlobalScope?new OffscreenCanvas(300,150):i.createElement("canvas"),a=r.getContext("2d",{willReadFrequently:!0}),o=(a.textBaseline="top",a.font="600 32px Arial",{});return e.forEach(function(e){o[e]=t(a,e,n)}),o}function t(e){var t=i.createElement("script");t.src=e,t.defer=!0,i.head.appendChild(t)}"undefined"!=typeof Promise&&(o="wpEmojiSettingsSupports",s=["flag","emoji"],n.supports={everything:!0,everythingExceptFlag:!0},e=new Promise(function(e){i.addEventListener("DOMContentLoaded",e,{once:!0})}),new Promise(function(t){var n=function(){try{var e=JSON.parse(sessionStorage.getItem(o));if("object"==typeof e&&"number"==typeof e.timestamp&&(new Date).valueOf()<e.timestamp+604800&&"object"==typeof e.supportTests)return e.supportTests}catch(e){}return null}();if(!n){if("undefined"!=typeof Worker&&"undefined"!=typeof OffscreenCanvas&&"undefined"!=typeof URL&&URL.createObjectURL&&"undefined"!=typeof Blob)try{var e="postMessage("+f.toString()+"("+[JSON.stringify(s),u.toString(),p.toString()].join(",")+"));",r=new Blob([e],{type:"text/javascript"}),a=new Worker(URL.createObjectURL(r),{name:"wpTestEmojiSupports"});return void(a.onmessage=function(e){c(n=e.data),a.terminate(),t(n)})}catch(e){}c(n=f(s,u,p))}t(n)}).then(function(e){for(var t in e)n.supports[t]=e[t],n.supports.everything=n.supports.everything&&n.supports[t],"flag"!==t&&(n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&n.supports[t]);n.supports.everythingExceptFlag=n.supports.everythingExceptFlag&&!n.supports.flag,n.DOMReady=!1,n.readyCallback=function(){n.DOMReady=!0}}).then(function(){return e}).then(function(){var e;n.supports.everything||(n.readyCallback(),(e=n.source||{}).concatemoji?t(e.concatemoji):e.wpemoji&&e.twemoji&&(t(e.twemoji),t(e.wpemoji)))}))}((window,document),window._wpemojiSettings); /* ]]> */ </script> <style id='wp-emoji-styles-inline-css' type='text/css'> img.wp-smiley, img.emoji { display: inline !important; border: none !important; box-shadow: none !important; height: 1em !important; width: 1em !important; margin: 0 0.07em !important; vertical-align: -0.1em !important; background: none !important; padding: 0 !important; } </style> <link rel='stylesheet' id='wp-block-library-css' href='https://wingify.com/wp-includes/css/dist/block-library/style.min.css?ver=6.7.2' type='text/css' media='all' /> <style id='vwo-gutenberg-vwo-protip-style-inline-css' type='text/css'> #vwo-gutenberg .vwo-protip-section{align-items:flex-start;background-color:#e8edff;border-radius:5px;display:flex;gap:15px;margin-bottom:20px;margin-top:20px;padding:24px}#vwo-gutenberg .vwo-protip-heading{color:#07003a;display:block;font-size:18px;font-weight:700;line-height:1.2;margin-bottom:8px}#vwo-gutenberg .vwo-protip-content{color:#07003a;font-size:13px;margin:0}#vwo-gutenberg .vwo-protip-section svg{flex-shrink:0}#vwo-gutenberg .vwo-protip-content strong{color:#07003a} </style> <style id='classic-theme-styles-inline-css' type='text/css'> /*! This file is auto-generated */ .wp-block-button__link{color:#fff;background-color:#32373c;border-radius:9999px;box-shadow:none;text-decoration:none;padding:calc(.667em + 2px) calc(1.333em + 2px);font-size:1.125em}.wp-block-file__button{background:#32373c;color:#fff;text-decoration:none} </style> <style id='global-styles-inline-css' type='text/css'> :root{--wp--preset--aspect-ratio--square: 1;--wp--preset--aspect-ratio--4-3: 4/3;--wp--preset--aspect-ratio--3-4: 3/4;--wp--preset--aspect-ratio--3-2: 3/2;--wp--preset--aspect-ratio--2-3: 2/3;--wp--preset--aspect-ratio--16-9: 16/9;--wp--preset--aspect-ratio--9-16: 9/16;--wp--preset--color--black: #000000;--wp--preset--color--cyan-bluish-gray: #abb8c3;--wp--preset--color--white: #ffffff;--wp--preset--color--pale-pink: #f78da7;--wp--preset--color--vivid-red: #cf2e2e;--wp--preset--color--luminous-vivid-orange: #ff6900;--wp--preset--color--luminous-vivid-amber: #fcb900;--wp--preset--color--light-green-cyan: #7bdcb5;--wp--preset--color--vivid-green-cyan: #00d084;--wp--preset--color--pale-cyan-blue: #8ed1fc;--wp--preset--color--vivid-cyan-blue: #0693e3;--wp--preset--color--vivid-purple: #9b51e0;--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple: linear-gradient(135deg,rgba(6,147,227,1) 0%,rgb(155,81,224) 100%);--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan: linear-gradient(135deg,rgb(122,220,180) 0%,rgb(0,208,130) 100%);--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange: linear-gradient(135deg,rgba(252,185,0,1) 0%,rgba(255,105,0,1) 100%);--wp--preset--gradient--luminous-vivid-orange-to-vivid-red: linear-gradient(135deg,rgba(255,105,0,1) 0%,rgb(207,46,46) 100%);--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray: linear-gradient(135deg,rgb(238,238,238) 0%,rgb(169,184,195) 100%);--wp--preset--gradient--cool-to-warm-spectrum: linear-gradient(135deg,rgb(74,234,220) 0%,rgb(151,120,209) 20%,rgb(207,42,186) 40%,rgb(238,44,130) 60%,rgb(251,105,98) 80%,rgb(254,248,76) 100%);--wp--preset--gradient--blush-light-purple: linear-gradient(135deg,rgb(255,206,236) 0%,rgb(152,150,240) 100%);--wp--preset--gradient--blush-bordeaux: linear-gradient(135deg,rgb(254,205,165) 0%,rgb(254,45,45) 50%,rgb(107,0,62) 100%);--wp--preset--gradient--luminous-dusk: linear-gradient(135deg,rgb(255,203,112) 0%,rgb(199,81,192) 50%,rgb(65,88,208) 100%);--wp--preset--gradient--pale-ocean: linear-gradient(135deg,rgb(255,245,203) 0%,rgb(182,227,212) 50%,rgb(51,167,181) 100%);--wp--preset--gradient--electric-grass: linear-gradient(135deg,rgb(202,248,128) 0%,rgb(113,206,126) 100%);--wp--preset--gradient--midnight: linear-gradient(135deg,rgb(2,3,129) 0%,rgb(40,116,252) 100%);--wp--preset--font-size--small: 13px;--wp--preset--font-size--medium: 20px;--wp--preset--font-size--large: 36px;--wp--preset--font-size--x-large: 42px;--wp--preset--spacing--20: 0.44rem;--wp--preset--spacing--30: 0.67rem;--wp--preset--spacing--40: 1rem;--wp--preset--spacing--50: 1.5rem;--wp--preset--spacing--60: 2.25rem;--wp--preset--spacing--70: 3.38rem;--wp--preset--spacing--80: 5.06rem;--wp--preset--shadow--natural: 6px 6px 9px rgba(0, 0, 0, 0.2);--wp--preset--shadow--deep: 12px 12px 50px rgba(0, 0, 0, 0.4);--wp--preset--shadow--sharp: 6px 6px 0px rgba(0, 0, 0, 0.2);--wp--preset--shadow--outlined: 6px 6px 0px -3px rgba(255, 255, 255, 1), 6px 6px rgba(0, 0, 0, 1);--wp--preset--shadow--crisp: 6px 6px 0px rgba(0, 0, 0, 1);}:where(.is-layout-flex){gap: 0.5em;}:where(.is-layout-grid){gap: 0.5em;}body .is-layout-flex{display: flex;}.is-layout-flex{flex-wrap: wrap;align-items: center;}.is-layout-flex > :is(*, div){margin: 0;}body .is-layout-grid{display: grid;}.is-layout-grid > :is(*, div){margin: 0;}:where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;}:where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;}.has-black-color{color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-color{color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-color{color: var(--wp--preset--color--white) !important;}.has-pale-pink-color{color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-color{color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-color{color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-color{color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-color{color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-color{color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-color{color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-color{color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-color{color: var(--wp--preset--color--vivid-purple) !important;}.has-black-background-color{background-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-background-color{background-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-background-color{background-color: var(--wp--preset--color--white) !important;}.has-pale-pink-background-color{background-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-background-color{background-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-background-color{background-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-background-color{background-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-background-color{background-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-background-color{background-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-background-color{background-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-background-color{background-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-background-color{background-color: var(--wp--preset--color--vivid-purple) !important;}.has-black-border-color{border-color: var(--wp--preset--color--black) !important;}.has-cyan-bluish-gray-border-color{border-color: var(--wp--preset--color--cyan-bluish-gray) !important;}.has-white-border-color{border-color: var(--wp--preset--color--white) !important;}.has-pale-pink-border-color{border-color: var(--wp--preset--color--pale-pink) !important;}.has-vivid-red-border-color{border-color: var(--wp--preset--color--vivid-red) !important;}.has-luminous-vivid-orange-border-color{border-color: var(--wp--preset--color--luminous-vivid-orange) !important;}.has-luminous-vivid-amber-border-color{border-color: var(--wp--preset--color--luminous-vivid-amber) !important;}.has-light-green-cyan-border-color{border-color: var(--wp--preset--color--light-green-cyan) !important;}.has-vivid-green-cyan-border-color{border-color: var(--wp--preset--color--vivid-green-cyan) !important;}.has-pale-cyan-blue-border-color{border-color: var(--wp--preset--color--pale-cyan-blue) !important;}.has-vivid-cyan-blue-border-color{border-color: var(--wp--preset--color--vivid-cyan-blue) !important;}.has-vivid-purple-border-color{border-color: var(--wp--preset--color--vivid-purple) !important;}.has-vivid-cyan-blue-to-vivid-purple-gradient-background{background: var(--wp--preset--gradient--vivid-cyan-blue-to-vivid-purple) !important;}.has-light-green-cyan-to-vivid-green-cyan-gradient-background{background: var(--wp--preset--gradient--light-green-cyan-to-vivid-green-cyan) !important;}.has-luminous-vivid-amber-to-luminous-vivid-orange-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-amber-to-luminous-vivid-orange) !important;}.has-luminous-vivid-orange-to-vivid-red-gradient-background{background: var(--wp--preset--gradient--luminous-vivid-orange-to-vivid-red) !important;}.has-very-light-gray-to-cyan-bluish-gray-gradient-background{background: var(--wp--preset--gradient--very-light-gray-to-cyan-bluish-gray) !important;}.has-cool-to-warm-spectrum-gradient-background{background: var(--wp--preset--gradient--cool-to-warm-spectrum) !important;}.has-blush-light-purple-gradient-background{background: var(--wp--preset--gradient--blush-light-purple) !important;}.has-blush-bordeaux-gradient-background{background: var(--wp--preset--gradient--blush-bordeaux) !important;}.has-luminous-dusk-gradient-background{background: var(--wp--preset--gradient--luminous-dusk) !important;}.has-pale-ocean-gradient-background{background: var(--wp--preset--gradient--pale-ocean) !important;}.has-electric-grass-gradient-background{background: var(--wp--preset--gradient--electric-grass) !important;}.has-midnight-gradient-background{background: var(--wp--preset--gradient--midnight) !important;}.has-small-font-size{font-size: var(--wp--preset--font-size--small) !important;}.has-medium-font-size{font-size: var(--wp--preset--font-size--medium) !important;}.has-large-font-size{font-size: var(--wp--preset--font-size--large) !important;}.has-x-large-font-size{font-size: var(--wp--preset--font-size--x-large) !important;} :where(.wp-block-post-template.is-layout-flex){gap: 1.25em;}:where(.wp-block-post-template.is-layout-grid){gap: 1.25em;} :where(.wp-block-columns.is-layout-flex){gap: 2em;}:where(.wp-block-columns.is-layout-grid){gap: 2em;} :root :where(.wp-block-pullquote){font-size: 1.5em;line-height: 1.6;} </style> <link rel='stylesheet' id='wingify-style-css' href='https://wingify.com/wp-content/cache/autoptimize/7/css/autoptimize_single_46c9d5b2cc86bfebb1f9c9c19c247fad.css?ver=6.7.2' type='text/css' media='all' /> <link rel='stylesheet' id='atomic-css' href='https://wingify.com/wp-content/cache/autoptimize/7/css/autoptimize_single_95f6284df657481734116c123dab9ac1.css?ver=6.7.2' type='text/css' media='all' /> <link rel="https://api.w.org/" href="https://wingify.com/wp-json/" /><link rel="alternate" title="JSON" type="application/json" href="https://wingify.com/wp-json/wp/v2/pages/20" /><link rel="EditURI" type="application/rsd+xml" title="RSD" href="https://wingify.com/xmlrpc.php?rsd" /> <meta name="generator" content="WordPress 6.7.2" /> <link rel='shortlink' href='https://wingify.com/?p=20' /> <link rel="alternate" title="oEmbed (JSON)" type="application/json+oembed" href="https://wingify.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwingify.com%2Finformation-security-policy%2F" /> <link rel="alternate" title="oEmbed (XML)" type="text/xml+oembed" href="https://wingify.com/wp-json/oembed/1.0/embed?url=https%3A%2F%2Fwingify.com%2Finformation-security-policy%2F&#038;format=xml" /> <style data-title="marketo-form-override">.marketo-custom-form .mktoForm{width:100% !important;color:inherit !important;font-family:inherit !important}.marketo-custom-form .mktoField,.marketo-custom-form .mktoForm,.marketo-custom-form .mktoLabel{font-size:14px !important}.marketo-custom-form .mktoOffset,.marketo-custom-form .mktoGutter{display:none !important}.marketo-custom-form .mktoFormCol,.marketo-custom-form .mktoFieldWrap{float:none !important;min-height:auto !important}.marketo-custom-form .mktoFieldWrap{margin-bottom:15px !important}.marketo-custom-form .mktoLabel{margin-bottom:5px !important;display:inline-block !important;width:auto !important;padding:0 !important;font-weight:600 !important;float:none !important;color:#1f2532 !important;line-height:1.4 !important;letter-spacing:normal}.marketo-custom-form input#implicitOptIn+label{display:none}.marketo-custom-form .mktoCheckboxList,.marketo-custom-form .mktoRadioList{float:none !important;width:100% !important;font-size:14px !important}.marketo-custom-form .mktoRadioList input[type=radio]{margin-top:2px !important}.marketo-custom-form .mktoTextField,.marketo-custom-form .mktoNumberField,.marketo-custom-form .mktoEmailField,.marketo-custom-form .mktoUrlField,.marketo-custom-form .mktoTelField,.marketo-custom-form .mktoDateField,.marketo-custom-form select,.marketo-custom-form select[multiple=multiple],.marketo-custom-form textarea{width:100% !important;border:1px solid #cfcfcf !important;border-radius:2px !important;background-color:#f4f7f8 !important;color:#2b3945 !important;padding:17px 22px !important;height:auto !important;float:none}.marketo-custom-form .mktoTextField:hover,.marketo-custom-form .mktoNumberField:hover,.marketo-custom-form .mktoEmailField:hover,.marketo-custom-form .mktoUrlField:hover,.marketo-custom-form .mktoTelField:hover,.marketo-custom-form .mktoDateField:hover,.marketo-custom-form select:hover,.marketo-custom-form select[multiple=multiple]:hover,.marketo-custom-form textarea:hover{background-color:#eef4fb !important}.marketo-white-bg .mktoTextField,.marketo-white-bg .mktoNumberField,.marketo-white-bg .mktoEmailField,.marketo-white-bg .mktoUrlField,.marketo-white-bg .mktoTelField,.marketo-white-bg .mktoDateField,.marketo-white-bg select,.marketo-white-bg select[multiple=multiple],.marketo-white-bg textarea{background-color:#fff !important;color:#2b3945 !important}.marketo-white-bg .mktoTextField:hover,.marketo-white-bg .mktoNumberField:hover,.marketo-white-bg .mktoEmailField:hover,.marketo-white-bg .mktoUrlField:hover,.marketo-white-bg .mktoTelField:hover,.marketo-white-bg .mktoDateField:hover,.marketo-white-bg select:hover,.marketo-white-bg select[multiple=multiple]:hover,.marketo-white-bg textarea:hover{background-color:#fff !important}.marketo-custom-form .mktoTextField.mktoInvalid,.marketo-custom-form .mktoNumberField.mktoInvalid,.marketo-custom-form .mktoEmailField.mktoInvalid,.marketo-custom-form .mktoUrlField.mktoInvalid,.marketo-custom-form .mktoTelField.mktoInvalid,.marketo-custom-form .mktoDateField.mktoInvalid,.marketo-custom-form select.mktoInvalid,.marketo-custom-form select[multiple=multiple].mktoInvalid,.marketo-custom-form textarea.mktoInvalid,.marketo-custom-form .mkt-custom-invalid{border:1px solid #eb5055 !important}.marketo-custom-form .mktoTextField:focus,.marketo-custom-form .mktoNumberField:focus,.marketo-custom-form .mktoEmailField:focus,.marketo-custom-form .mktoUrlField:focus,.marketo-custom-form .mktoTelField:focus,.marketo-custom-form .mktoDateField:focus,.marketo-custom-form select:focus,.marketo-custom-form select[multiple=multiple]:focus,.marketo-custom-form textarea:focus{background-color:#fff !important;border:1px solid #2196f3 !important}.marketo-custom-form textarea{height:auto !important;line-height:inherit !important}.marketo-custom-form select[multiple=multiple]{min-height:120px !important;padding:0 !important}.marketo-custom-form select[multiple=multiple] option{padding:5px 10px !important}.marketo-custom-form .mktoButtonRow{display:block !important}.marketo-custom-form .mktoButtonWrap{margin:0 !important;text-align:center !important;display:block !important}.marketo-custom-form .mktoButton{padding-left:50px !important;padding-right:50px !important;text-align:center !important;padding-top:15px !important;padding-bottom:15px !important;border:none !important;background:#e20072 !important;font-size:18px !important;color:#fff !important;border-radius:3px !important;box-sizing:border-box !important;width:100% !important;font-weight:700 !important;text-shadow:none !important;cursor:pointer !important}.marketo-custom-form .mktoButton:hover{background:#a33166 !important}.marketo-custom-form .mktoButton.button--disabled-primary{cursor:not-allowed !important;opacity:.3 !important}.marketo-custom-form--dark .mktoLabel{color:#fff !important;text-transform:none !important}.marketo-custom-form--full-width .mktoButton{width:auto !important}.marketo-custom-form .mktoError{position:static !important;background:0 0 !important}.mktoForm .mktoAsterix{float:right !important;padding-left:5px !important}.marketo-custom-form .mktoError .mktoErrorMsg{background:0 0 !important;border:none !important;box-shadow:none !important;text-shadow:none !important;padding:0 !important;border-radius:0 !important;display:inline-block !important;font-size:12px !important;color:#ff3838 !important}.marketo-custom-form .mktoErrorArrowWrap{display:none !important}.marketo-custom-form label[id=LblimplicitOptIn]{float:right !important;width:calc(100% - 25px) !important;font-size:13px !important;font-weight:400 !important}.marketo-custom-form .mktoRadioList>label{margin-top:0 !important}.recurring_webinar_form .mktoRadioList>label{margin-bottom:20px !important}.recurring_webinar_form .mktoRadioList>label b{display:inline-block;margin-bottom:5px;padding:0}.marketo-custom-form--dark .mktoLabel{color:#fff !important;text-transform:none !important}.marketo-custom-form--full-width .mktoButton{width:auto !important}.marketo-custom-form--full-width .mktoButton{width:70% !important}.marketo-success--dark{font-size:1.125rem;color:#d9dde1;margin-top:1rem}.marketo-success--white{font-size:1.125rem;color:#fff;margin-top:1rem}.marketo-custom-form--dark .mktoRadioList label{color:#fff !important}.marketo_success_msg p,.marketo_success_msg .marketo_success_msg_text{font-size:18px;font-weight:600}.marketo-custom-form #Where_did_you_hear_about_us__c{cursor:pointer}.marketo-custom-form .marketo_hide_field{display:none}.marketo-custom-form--large input[type=text],.marketo-custom-form--large input[type=email]{padding:13px 15px !important;border:1px solid #181818 !important}.marketo-custom-form--half-width .mktoForm>.mktoFormRow:nth-of-type(1),.marketo-custom-form--half-width .mktoForm>.mktoFormRow:nth-of-type(2){float:none;width:100%;clear:both;margin-right:0}@media screen and (min-width:1024px){.marketo-custom-form--half-width .mktoForm>.mktoFormRow:nth-of-type(1),.marketo-custom-form--half-width .mktoForm>.mktoFormRow:nth-of-type(2){float:left;width:48%;clear:none}.marketo-custom-form--half-width .mktoForm>.mktoFormRow:nth-of-type(1){margin-right:4%}}</style> <!-- eslint-disable --> <!-- Start VWO Async SmartCode --> <link rel="preconnect" href="https://dev.visualwebsiteoptimizer.com" /> <script nonce="EROdgveJbp2AV02DIMwekXSVBNsGHVXW" type='text/javascript' id='vwoCode'> window._vwo_code || (function() { var account_id=820063, version=2.1, settings_tolerance=2000, hide_element='body', hide_element_style = 'opacity:0 !important;filter:alpha(opacity=0) !important;background:none !important;transition:none !important;', /* DO NOT EDIT BELOW THIS LINE */ f=false,w=window,d=document,v=d.querySelector('#vwoCode'),cK='_vwo_'+account_id+'_settings',cc={};try{var c=JSON.parse(localStorage.getItem('_vwo_'+account_id+'_config'));cc=c&&typeof c==='object'?c:{}}catch(e){}var stT=cc.stT==='session'?w.sessionStorage:w.localStorage;code={nonce:v&&v.nonce,use_existing_jquery:function(){return typeof use_existing_jquery!=='undefined'?use_existing_jquery:undefined},library_tolerance:function(){return typeof library_tolerance!=='undefined'?library_tolerance:undefined},settings_tolerance:function(){return cc.sT||settings_tolerance},hide_element_style:function(){return'{'+(cc.hES||hide_element_style)+'}'},hide_element:function(){if(performance.getEntriesByName('first-contentful-paint')[0]){return''}return typeof cc.hE==='string'?cc.hE:hide_element},getVersion:function(){return version},finish:function(e){if(!f){f=true;var t=d.getElementById('_vis_opt_path_hides');if(t)t.parentNode.removeChild(t);if(e)(new Image).src='https://dev.visualwebsiteoptimizer.com/ee.gif?a='+account_id+e}},finished:function(){return f},addScript:function(e){var t=d.createElement('script');t.type='text/javascript';if(e.src){t.src=e.src}else{t.text=e.text}v&&t.setAttribute('nonce',v.nonce);d.getElementsByTagName('head')[0].appendChild(t)},load:function(e,t){var n=this.getSettings(),i=d.createElement('script'),r=this;t=t||{};if(n){i.textContent=n;d.getElementsByTagName('head')[0].appendChild(i);if(!w.VWO||VWO.caE){stT.removeItem(cK);r.load(e)}}else{var o=new XMLHttpRequest;o.open('GET',e,true);o.withCredentials=!t.dSC;o.responseType=t.responseType||'text';o.onload=function(){if(t.onloadCb){return t.onloadCb(o,e)}if(o.status===200||o.status===304){_vwo_code.addScript({text:o.responseText})}else{_vwo_code.finish('&e=loading_failure:'+e)}};o.onerror=function(){if(t.onerrorCb){return t.onerrorCb(e)}_vwo_code.finish('&e=loading_failure:'+e)};o.send()}},getSettings:function(){try{var e=stT.getItem(cK);if(!e){return}e=JSON.parse(e);if(Date.now()>e.e){stT.removeItem(cK);return}return e.s}catch(e){return}},init:function(){if(d.URL.indexOf('__vwo_disable__')>-1)return;var e=this.settings_tolerance();w._vwo_settings_timer=setTimeout(function(){_vwo_code.finish();stT.removeItem(cK)},e);var t;if(this.hide_element()!=='body'){t=d.createElement('style');var n=this.hide_element(),i=n?n+this.hide_element_style():'',r=d.getElementsByTagName('head')[0];t.setAttribute('id','_vis_opt_path_hides');v&&t.setAttribute('nonce',v.nonce);t.setAttribute('type','text/css');if(t.styleSheet)t.styleSheet.cssText=i;else t.appendChild(d.createTextNode(i));r.appendChild(t)}else{t=d.getElementsByTagName('head')[0];var i=d.createElement('div');i.style.cssText='z-index: 2147483647 !important;position: fixed !important;left: 0 !important;top: 0 !important;width: 100% !important;height: 100% !important;background: white !important;display: block !important;';i.setAttribute('id','_vis_opt_path_hides');i.classList.add('_vis_hide_layer');t.parentNode.insertBefore(i,t.nextSibling)}var o=window._vis_opt_url||d.URL,s='https://dev.visualwebsiteoptimizer.com/j.php?a='+account_id+'&u='+encodeURIComponent(o)+'&vn='+version;if(w.location.search.indexOf('_vwo_xhr')!==-1){this.addScript({src:s})}else{this.load(s+'&x=true')}}};w._vwo_code=code;code.init();})(); </script> <!-- End VWO Async SmartCode --> <!-- eslint-enable --> </head> <body> <header class="top-header " id="top_header"> <div class="top-header-content"> <div class="container"> <div class="block-left"> <h1 class="logo"> <a href="/" class="hide-text">Wingify</a> </h1> <a href="#" class="nav-button js-toggle-wingify-menu"> <span class="button-text">Menu</span> </a> </div> <nav> <ul class="navigation"> <li><a href="https://vwo.com/platform/">Our Products</a></li> <li><a href="https://wingify.com/about">Our Team</a></li> <li><a href="https://wingify.com/careers">Careers</a></li> <li><a href="https://wingify.com/contact" >Contact Us</a></li> </ul> <div class="clr"></div> </nav> <div class="clr"></div> <div class="contact-overlay"></div> </div> </div> </header> <div style='left:-200px; width:100px; position: absolute' id='xyz'> </div><section class="section-intro"> <div class="container"> <div class="main-heading"> <h1 class="grey">Information Security Policy and Practices</h1> </div> </div> </section> <div id="js-header-fixed-trigger"></div> <section class="section section-policy-pages"> <div class="container"> <b class="tagline">Version: 1.3</b><br/> <b>Effective from: May 21, 2021</b> <h2>1. Overview</h2> <p> Wingify Software Pvt Ltd. (herein referred to as Wingify in this document) is committed to ensuring the Confidentiality, Integrity, and Availability (CIA) and provide comprehensive protection to its information assets against the consequences of confidentiality breaches, failures of integrity and/ or interruptions to their availability. To provide adequate protection for information assets, Wingify has built the Information Security Management System (ISMS) which includes the respective policies to be followed in a diligent, consistent, and impartial manner. Wingify will implement procedures and controls at all levels to protect the confidentiality and integrity of information stored and processed on its systems and ensure that information is available only to authorized persons as and when required. </p> <p> This document details Wingify policies to ensure the protection of its information assets, and to allow the use, access, and disclosure of such information in accordance with appropriate standards, laws, and regulations. </p> <p> All workforce members, customers, and third parties who use Wingify’s information processing facilities are required to comply with the Information Security policy of Wingify. All the existing Wingify policies, relating to personnel, administration, protection of confidential information, and other areas would apply equally to the information systems environment. </p> <h2>2. Applicability</h2> <p> Wingify is committed to complying with all applicable regulations and law of the land in all locations and countries related to its operations and information processing. </p> <p> The key regulation that is complied with includes laws related to corporate governance, employee relations, data privacy, intellectual property, and financial reporting. </p> <h2>3. Scope</h2> <p> The scope of this policy covers all information assets owned or provided by Wingify, whether they reside on the corporate network or elsewhere. </p> <p> Information Security policies apply to all business functions of Wingify which include: </p> <div class="table-responsive"> <table> <tr> <td>Human Resource</td> <td>Finance &amp; Accounts</td> <td>Administration</td> <td>Business Operations and Analytics</td> </tr> <tr> <td>Information Technology</td> <td>Legal</td> <td>Program</td> <td>Design</td> </tr> <tr> <td>Engineering</td> <td>Product</td> <td>Marketing</td> <td>Sales</td> </tr> <tr> <td>Customer Success Management</td> <td>Product Success</td> <td>Ideact</td> <td>Security &amp; Compliance</td> </tr> </table> </div> <p> The Information Security policies apply to any person (employees, consultants, customers, and third parties), who accesses and uses Wingify information systems. </p> <p> Wingify has established, implemented, maintained, and continually improved the Information Security Management System within the context of its overall business activities and risks it may face in accordance with the requirements of the ISO 27001:2013 standard. The ISMS processes used are based on the <strong>Plan, Do, Check,</strong> and <strong>Act</strong> (PDCA) model. </p> <ol type="I"> <li> <strong>Plan</strong> (Establish the ISMS) <p>Wingify has established policies, related processes, objectives, and procedures relevant for managing risks and improving information security to deliver results in accordance with its overall policies and objectives. The Plan phase includes:</p> <ol type="a"> <li>Establishing the ISMS</li> <li>Defining the scope of ISMS</li> <li>Defining an ISMS manual</li> <li>Defining a systematic approach to risk assessment</li> <li>Identifying risks</li> <li>Assessing the risks</li> <li>Identifying and evaluating options for the treatment or risks</li> <li>Selecting control objectives</li> <li>Preparing a statement of applicability</li> </ol> </li> <li> <strong>Do</strong> (Implement and operate the ISMS) <p>Wingify has adopted and implemented procedures and processes to ensure compliance and adherence to the ISMS framework. Wingify management made all the necessary resources available to ensure implementation and operation according to the ISMS. The Do phase includes:</p> <ol type="a"> <li>Formulating a risk treatment plan</li> <li>Implementing the risk treatment plan</li> <li>Implementing controls</li> <li>Implementing training and awareness programs</li> <li>Managing operations</li> <li>Managing resources</li> <li>Implementing procedures and other controls for incident handling</li> </ol> </li> <li> <strong>Check</strong> (Monitor and review the ISMS) <p> The compliance team ensures regular and continuous monitoring by conducting periodic assessments, reviews, and audits of the Information Security policy of Wingify. The Check phase includes: </p> <ol type="a"> <li>Executing monitoring procedures and other controls</li> <li>Undertaking regular reviews of the effectiveness of ISMS</li> <li>Reviewing the risk of residual risk and acceptable risk</li> <li>Conducting internal ISMS audits</li> <li>Undertaking management review of ISMS</li> <li>Recording actions and events that could have an impact on the effectiveness or performance of ISMS</li> </ol> </li> <li> <strong>ACT</strong> (Maintain and improve the ISMS) <p> Continual improvement in the effectiveness of ISMS at Wingify is demonstrated through the use of Security Policy, Security Objective, Audit Results, Analysis of Data, Corrective and Preventive Actions, and Management Review. The Act phase includes: </p> <ol type="a"> <li>Maintaining and improving the ISMS</li> <li>Implementing identified improvements</li> <li>Taking appropriate corrective actions and preventive actions</li> <li>Communicating the results & actions, and agreeing with all interested parties</li> <li>Ensuring that the improvements help achieve their intended objective</li> </ol> </li> </ol> <h2>4. Leadership and Commitment</h2> <p> Wingify is committed to security. The top management has constituted Wingify Corporate Security and Compliance Team, which is responsible for defining and improving the ISMS. </p> <p> The top management has demonstrated leadership and commitment with respect to the information security management system by: </p> <ol type="i"> <li>Ensuring that the information security policy and the information security objectives are established and are compatible with the strategic direction of Wingify</li> <li>Ensuring integration of ISMS requirements into Wingify’s processes</li> <li>Ensuring that the resources needed for ISMS are available</li> <li>Communicating the importance of effective information security management and of conforming to the information security management system requirements</li> <li>Ensuring that ISMS achieves its intended outcome(s)</li> <li>Directing and supporting persons to contribute to the effectiveness of ISMS</li> <li>Promoting continual improvement</li> <li>Supporting other relevant management roles to demonstrate their leadership as it applies to their areas of responsibility</li> </ol> <h2>5. Policy</h2> <p>The following is the information security management policy statement adopted by Wingify:</p> <blockquote> “Wingify is committed to ensuring integrity, confidentiality, availability, and security of its physical and information assets at all times for serving the needs and expectations of its interested parties both within organization and from external parties including clients, suppliers, regulatory, and governmental departments in line with its vision, mission, and values while meeting all legal, statutory, regulatory, and contractual requirements. Wingify’s information systems and the information and data they contain are fundamental for its daily operations and future success. Wingify will develop, implement, maintain, and continually improve policies, procedures, and controls at all levels to protect the confidentiality and integrity of information stored and processed on its systems and ensure that information is available to authorized persons as and when required.” </blockquote> <p>The Information Security measures include:</p> <h3>5.1. Governance and Organization Structure </h3> <ul> <li> Wingify has established a Corporate Security and Compliance Team (CSC) made up of key personnel whose responsibility is to identify areas of security and compliance concern across Wingify and act as the first line of defense in enhancing the appropriate security and compliance posture. This team reports to the CEO. </li> <li> The team comprises the workforce who are knowledgeable in legal cross-regulation, policy, products, and IT, and are interested in ensuring five of the trust principles—confidentiality, integrity, availability, privacy, and security—with regard to data protection by law, compliance, and standards across Wingify. The CEO has assigned the responsibilities and authority to Data Protection Officer for overseeing and maintaining information security and compliance as per the standard and industry best practices. </li> <li> The governance of these programs is performed by the Corporate Security and Compliance Committee, consisting of executives and other department heads from across Wingify. </li> </ul> <h3>5.2. Personnel Security </h3> <ul> <li> Wingify has established a formal sanctions policy and process for personnel failing to comply with established information security and compliance policies and procedures. </li> <li> Wingify has established personnel security requirements, including security roles and responsibilities for third-party providers, and monitors provider compliance. </li> <li> Wingify screens individuals requiring access to critical and production environment information and information systems before authorizing access. The only workforce with the highest clearance has access to our data center data. Workforce access is logged, and passwords are strictly regulated. We follow as needed basis access principles to production data to only a select few of these workforces who need such access to provide support and troubleshooting. </li> <li> As per the established process, on termination of individual employment, Wingify terminates information system access, conducts exit interviews, retrieves all organizational information system-related property, and provides appropriate personnel with access to official records created by the terminated workforce that are stored on organizational information systems. </li> <li> Wingify has developed a world-class practice for managing security and data protection risk. </li> <li> Awareness and Training <ul> <li> All workforce members complete an annual information security and privacy awareness and training program. </li> <li> As part of this program, additional role-based training is provided to the workforce, before they start handling sensitive and confidential information. </li> <li> Information Security and Compliance Training Guide is provided as a quick reference guide to workforce members. </li> <li> Training logs identifying the training class, attendee, and date are kept by the HR department. </li> </ul> </li> </ul> <h3>5.3. Information Asset Management </h3> <ul> <li> Wingify has established a formal Asset Management policy; and the process is necessary to facilitate effective management, control, and maintenance of the assets/information to its operations environment by classifying assets as per the functionality or criticality. </li> <li> This policy to identify, classify, label, and handle Information Assets of Wingify, and to apply protection mechanisms commensurate with the level of confidentiality and sensitivity. </li> <li> The confidentiality and sensitivity of information will be maintained through an Information Asset classification scheme. The level of security to be accorded to the information of Wingify depends directly on the classification level of the asset, which is associated with that information. </li> <li> The Information Asset Inventory must contain the following information as a minimum: <ul> <li>Information Asset Identification </li> <li>Information Asset Description</li> <li>Information Asset Location</li> <li>Information Asset Owner/Custodian</li> <li>Information Asset Classification</li> </ul> </li> <li> <h3>Information at Wingify</h3> <p>Wingify information may include, but is not limited to:</p> <ul> <li> All proprietary information that belongs to Wingify such as user manuals, training materials, operating and support procedures, business continuity plans, and audit trails. </li> <li> Personnel information relating to employees of Wingify. </li> <li> All client information & product research-related data held by Wingify. </li> <li> All software assets such as application software, system software, development tools, and utilities. </li> <li> All physical assets, such as computer equipment, communications equipment, removable media, and equipment relating to facilities. </li> <li> All services, such as power, lighting, and HVAC associated with Wingify information systems. </li> <li> People assets. </li> <li> Intangibles asset such as the reputation and image of Wingify. </li> </ul> </li> </ul> <h3>5.4. Access Control </h3> <p> The access controls required to meet the security objectives of the Information Security policy. Access control management is paramount to protecting Wingify information resources and requires implementation of controls and continuous oversight to restrict access. </p> <p> Confidentiality, Integrity, and Availability (CIA) are fundamental aspects of protection of systems and information, and are achieved through logical, physical, and procedural controls. It is vital for the protection of systems and information authorized users who have access to Wingify systems and information are aware of and understand how their actions may affect security and privacy. </p> <p> The policy is organized into the following key sections which map directly to the ISO 27001 Access Control Domain security objectives: </p> <ul> <li> <ul> <li>Business Requirements for Access Control</li> <li>User Access Management</li> <li>User Responsibilities</li> <li>Application and Application Access Control</li> <li>Mobile Computing and Teleworking</li> </ul> </li> </ul> <ul> <li> Access control is established by imposing standards for protection at the operating system level, at the Application level, and at the Database level. Access to Wingify computer systems will be based on the principles of <strong>“least privilege”</strong> and <strong>"need to know”</strong> and must be administered to ensure that appropriate level of access control is applied to users as well as system support personnel to protect Wingify information systems. </li> <li> Administrative (also known as "root") access to systems is limited to Workforce Members who have a legitimate business need for this type of access. Administrative access to network devices is logged. </li> <li> All access to Wingify systems and services are reviewed by CSC and updated on a quarterly basis to assure proper authorizations are in place commensurate with job functions. </li> <li> Access to electronically stored records containing personal information will be electronically limited to those workforces having an authorized and unique login ID assigned. </li> <li> Where practical, all visitors who are expected to access areas other than common space or are granted access to office space containing personal information should be required to sign in at a designated reception area where they will be assigned a visitor’s ID or guest badge unless escorted at all times. Visitors are required to wear said visitor ID in a plainly visible location on their body unless escorted at all times. </li> <li> Where practical, all visitors are restricted from areas where files containing personal information are stored. Alternatively, visitors must be escorted or accompanied by an approved person in any area where files containing personal information are stored. </li> <li> Cleaning personnel (or others after normal business hours and not also authorized to have access to personal information) are not to have access to areas where files containing personal information are stored. </li> <li> All computers with an Internet connection or any computer that stores or processes personal information must have a recently updated version of software providing virus, anti-spyware, and anti-malware protection, installed and active at all times. </li> <li> Password Management: We have processes designed to enforce minimum password requirements for Wingify Service. We currently enforce the following requirements and security standards for end user passwords on Wingify Service: <ul> <li> Passwords must be a minimum of 8 characters in length and include a mix of uppercase and lowercase letters as well as numbers and symbols. </li> <li> Multiple sign-ins with the wrong username or password will result in a locked account, which will be disabled for a period of time to help prevent a brute-force sign-in, but not long enough to prevent legitimate users from being unable to use the application. </li> <li> Email-based password reset links are sent only to a user's pre-registered email address with a temporary link. </li> <li> Wingify prevents reuse of recently-used passwords. </li> </ul> </li> </ul> <h3>5.5. Physical and Environmental Security </h3> <p> Our data centers are hosted in some of the most secure facilities available today in locations and use industry best practices that are protected from physical and logical attacks as well as from natural disasters, such as earthquakes, fires, and floods. Physical security measures for these data centers include intrusion protection measures and security guards. We rely on third-party attestations of their physical security. Within our office premises, we employ a number of best industry-standard physical security controls. </p> <h3>5.6. Operational Security </h3> <ul> <li> Wingify has established a formal policy and process for the requirements and key information security considerations for information technology operations, including the definition of standard operating procedures, change management, configuration management, release management, information backup, and restoration and cloud computing. <p> There are a number of controls in place to achieve the protection of data, information, and information system: </p> <ul> <li>Operational Procedure and Responsibilities </li> <li>Change Management</li> <li>Protection from Malware </li> <li>Information Backup </li> <li>Logging and Monitoring </li> <li>Operational Software Control</li> <li>Technical Vulnerability Management</li> <li>Information System Audit Control </li> </ul> </li> <li> <strong>Risk Management:</strong> <ul> <li> Wingify has established and implemented robust Risk Management Procedure and Process in place and conduct periodic risk assessments for the organization using the baseline methodology based on ISO 27001 standard framework with cross-reference with ISO 27005, NIST SP 800-39, 37 Rev1, SOC 2, PCI DSS and industry best practices. </li> <li> Wingify is not willing to accept any risk that might damage customer trust. In addition, any risks that threaten to make us non-compliant to regulations and standard. </li> <li> The possible values of existing risk acceptance/treatment/transfer level of residual risk post calculation are: <div class="table-responsive"> <table> <thead> <tr> <td>Slab Level</td> <td>Risk rating</td> <td>Risk Description</td> <td>Management action</td> </tr> </thead> <tbody> <tr> <td>1<sup>st</sup></td> <td>1</td> <td>Negligible Risk</td> <td>Accept risk - No action required</td> </tr> <tr> <td>2<sup>nd</sup></td> <td>2</td> <td>Low Risk</td> <td>Accept risk - No action required</td> </tr> <tr> <td>3<sup>rd</sup></td> <td>3</td> <td>Moderate Risk</td> <td>Treat/ transfer risk</td> </tr> <tr> <td>4<sup>th</sup></td> <td>4</td> <td>High Risk</td> <td>Treat/ transfer risk</td> </tr> <tr> <td>5<sup>th</sup></td> <td>5</td> <td>Very High risk</td> <td>Treat/ transfer risk</td> </tr> </tbody> </table> </div> </li> <li> Risk Treatment Plan involves prioritizing, evaluating, and implementing appropriate controls as per the risk computation. A treatment plan shall be prepared for each identified risk as per the risk assessment performed where existing risk rating is greater than 2. </li> </ul> </li> </ul> <h3>5.7. Communication Security </h3> <p> Wingify has deployed an information technology network to facilitate its business and make it more efficient for various risks. And establish management direction, principles, and standard requirement to ensure that the appropriate protection of information on its networks maintained and sustained. Few controls which in place to achieve the protection of exchanged information from interception, copying, modification, misrouting, and destruction as follow: </p> <ul> <li> <strong>Network Controls:</strong> Wingify monitors and updates its communication technologies periodically with the goal of providing network security as per industry best practices cryptographic techniques are used to protect the confidentiality, integrity, and authenticity of sensitive and confidential information. Firewall rules and access restrictions are reviewed for appropriateness on a regular basis. </li> <li> <strong>Infrastructure Controls:</strong> Wingify uses an Intrusion Detection System (IDS), a Security Incident Event Management (SIEM) system and other security monitoring tools on the production servers hosting the Wingify product service. Notifications from these tools are sent to the Wingify Security Team so that they can take appropriate action. </li> <li> <strong>Secure Communication:</strong> All data transmissions to Wingify services are encrypted using TLS protocols, and we use certificates issued by SHA 256 based CA ensuring that our users have a secure connection from their browsers to our service. We use the latest and updated cipher suites Wingify Products are always communicated via HTTPS using Transport Layer Security (TLS), a cryptographic protocol that is designed to protect against eavesdropping, tampering, and message forgery. </li> <li> Wingify Product is always connected to the web-app via HTTPS using Secure Sockets Layer (SSL), a cryptographic protocol that is designed to protect against eavesdropping, tampering, and message forgery. </li> <li> Retention and disposal guidelines for all business correspondence including messages, in accordance with the defined standard. </li> <li> Segregation of the network shall be done by establishing V-LAN/ DMZ architecture. In either case, Testing, Production and Development environment shall be segregated as well. </li> <li> Agreements have been established for the secure transfer of business information to external parties (such as customers, suppliers, and other interested parties). </li> <li> The roles and responsibilities for management of network security shall be clearly defined, communicated and reviewed on a regular basis to ensure optimum operative effectiveness and necessary segregation of duties shall be done to attain the said objective. </li> </ul> <h3>5.8. System Acquisition, Development, and Maintenance</h3> <p> Wingify has established Software Development Lifecycle adopted for planning, requirement analysis, design, development, testing and maintenance of the product VWO Experience Optimization Platform. There are controls which in place to achieve the information security and data protection requirements as follow: </p> <h3>Product Security</h3> <ul> <li> Wingify product security practices are measured using industry standard and methodologies security models. Wingify follows Agile methodologies for feature delivery and Scrum is used for new feature delivery. The SDLC for the Wingify Product services includes many activities to enhance security and privacy posture: <ul> <li>Defining security and privacy requirements</li> <li>Design (threat modeling and analysis, security design review)</li> <li>Development controls (static analysis, manual peer code review)</li> <li>Testing (dynamic analysis, 3rd party security vulnerability assessments and Pen Test)</li> </ul> </li> <li> Wingify Product designs, reviews, and tests the software using applicable OWASP and CIS standards. </li> <li> We use Definition of Done (DoD) to maintain the quality of deliverables, A clear and consistent Definition of Done is an effort to create an objective framework for quality. DoD provides a clear guideline to the team and to the stakeholders around exactly what needs to be done for each Story, Sprint, Release, and Task to ensure a consistent and sustainable quality of deliverables. It ensures transparency and quality fit for the purpose of the product and organization </li> </ul> <h3>Code Security</h3> <ul> <li> Wingify Product code is stored in a Stash / Atlassian system hosted by most secure data centers facilities. Wingify adopts a strict, least access privileges principle for providing access to the code. Commits to production code are strictly reviewed, and approval is restricted to just two people (Chief Technical Officer and Lead Engineer), after passing Unit Testing and QA in Test and Staging. </li> <li> Manual source code analysis on security-sensitive areas of code </li> <li> The Wingify development team is trained on Open Web Security Application Project (OWASP) Secure Coding Practices and uses industry best practices for building secure apps. </li> </ul> <h3>Bugs Reporting</h3> <p> Wingify takes the security of its systems seriously and values the security community. The responsible disclosure of security and privacy vulnerabilities helps Wingify in ensuring the security and privacy of its users. Bugs can be reported through email at <a href="/cdn-cgi/l/email-protection#bfccdadccacdd6cbc6ffc8d6d1d8d6d9c691dcd0d291"><span class="__cf_email__" data-cfemail="0d7e686e787f6479744d7a64636a646b74236e6260">[email&#160;protected]</span>.</a> </p> <h3>5.9. Third-Party Supplier</h3> <ul> <li> Wingify provides essential services and business functions which rely on IT solutions and applications contracted by third-party suppliers, which may be primary or subcontractors. </li> <li> Wingify maintains the integrity and accuracy of its information to meet its goals and obligations, both to the business and to people. To ensure this, it is essential that information is secured in line with professional best practices as well as statutory, regulatory, and contractual requirements that maintain confidentiality, integrity, and availability of all information assets. </li> <li> Wingify has established a formal Third-Party Supplier policy and put in place a procurement process so that contracts and dealings between Wingify and third-party suppliers have acceptable levels of data protection and information security in place to protect information (such as personal & company data) and maintain the confidentiality, availability, and integrity of information and are fit for purpose. Information security requirement will vary according to the type of contractual relationship with each supplier. There are a few controls in place to achieve protection of data, information, and information system as follows: <ol type="i"> <li> Information security and controls should be formally documented in a contractual agreement which may be part of or an addendum to the main commercial service contract. </li> <li> Separate Non-Disclosure Agreement should be used where a more specific level of control over confidentiality is required. </li> <li> Appropriate due diligence must be exercised in the selection and approval of new supplier before the contract is agreed. </li> <li> The information security provisions in place at existing suppliers (where due diligence was not undertaken as part of initial selection) must be clearly understood and improved where necessary. </li> <li> Access to Wingify, information should be limited wherever possible according to clear business needs. </li> <li> Basic information security principles such as least privilege, separation of duties, and defense in depth should be applied. </li> <li> Wingify will have the Rights to Audit the information security and privacy practices of the supplier and/or the subcontractor. </li> <li> Supplier access to Wingify information resources is granted solely for the work contracted and for no other purpose. </li> <li> The supplier must comply with all applicable data protection regulation, best practice standards, and agreements. </li> <li> On termination of a supplier or supplier employee from the contract for any reason, the supplier will ensure that all sensitive and confidential information is collected and returned to Wingify or destroyed within 24 hours. </li> </ol> </li> <li> The security of information is fundamental to Wingify’s compliance with data protection legislation and a key focus in its ISO 27001 risk assessment, procurement, and management strategy. </li> </ul> <h3>Due Diligence </h3> <p> Before contracting with a third-party supplier, it is incumbent upon Wingify to exercise due diligence in reaching as much understanding as possible of the information security approach and controls the company has in place. It is important that the documented “supplier due to diligence assessment" procedure is followed so that all the required information is collected and an informed assessment can be made. </p> <h3>Contract </h3> <p> All Wingify contracts will clearly define each party’s data protection and information security responsibilities toward the other by detailing the parties to the contract, effective date, functions or services being provided (such as defined service levels), liabilities, limitations on use of subcontractors and other commercial/legal matters normal to any contract. </p> <p> The processing must be governed by a contract in writing between the controller and the processor, setting out the following: </p> <ul> <li>Subject matter and duration of the processing </li> <li>Nature and purpose of the processing </li> <li>Type of personal data and categories of data subjects involved </li> <li>Obligations and rights of the controller and processor </li> </ul> <h3>5.10. Reporting Security and Privacy Breaches</h3> <ul> <li> Wingify has a Security Incident Response Plan designed to promptly and systematically respond to security, privacy, and availability incidents that may arise. The incident response plan is tested and refined on a regular basis. Security Incident Response Policy & Procedure has become an important component of Wingify Information Security programs. </li> <li> The primary focus of the plan is detecting, analyzing, prioritizing, and handling security incidents. </li> <li> Wingify follows policies and procedures to detect, respond to, and otherwise address security incidents including procedures to: <ul> <li>Identify and respond to suspected or known security incidents followed by mitigating their harmful effects and documenting these incidents along with their outcomes.</li> <li>Restore the availability or access to Customer Personnel.</li> <li>Retrieve data in a timely manner.</li> </ul> </li> <li> Notice: Wingify agrees to provide a prompt written notice within the time frame required under Applicable Data Protection Law(s) to a customer’s Designated POC if it knows or suspects that a security incident has taken place. Such notice will include all available details required under Applicable Data Protection Law(s) for the customer to comply with its own notification obligations to regulatory authorities or individuals affected by the security incident. </li> <li> Under no circumstances should a user attempt to resolve any security and privacy breach on their own without first consulting the Wingify DPO. Users may attempt to resolve security and privacy breaches only under the instruction of, and with the express permission of the DPO. </li> </ul> <h3>5.11. Business Contingency and Disaster Recovery </h3> <ul> <li> Wingify has established a formal business contingency management (BCM) plan and a Disaster Recovery Plan (DRP) to minimize downtime of the critical business process, and recovery within required and agreed business timescales in the event of a disaster. Wingify has also created a clearly defined framework for the ongoing management of the BCM activities and provide guidelines for the development, testing, maintenance, and implementation of business continuity plans. </li> <li> Wingify defined two categories of systems from the disaster recovery perspective: <ul> <li> <strong>Critical Systems:</strong> These systems host application servers and database servers or are required for the functioning of systems that host application servers and database servers. These systems, if unavailable, affect the availability of data and must be restored, or have a backup process to restore these, immediately on becoming unavailable. </li> <li> <strong>Non-Critical Systems:</strong> These systems include the ones that are not considered most critical. These systems, while they may affect the performance and overall security of critical systems, do not prevent critical systems from functioning and being accessed appropriately. These systems are restored at a lower priority than critical systems. </li> </ul> </li> <li> Backup: To prevent data loss due to human error, our application databases are backed up every hour in an automated fashion. </li> <li> Data Replication: Our customer and application databases are timely replicated on backup servers along with our CDN servers which are geo-redundant. </li> <li> Location: We store customer data in a secure data center at an offsite location in the US. </li> <li> Internet Redundancy: Wingify is connected through multiple Tier-1 ISPs. So, if anyone fails or experiences a delay, you can still reliably get to your applications and information. </li> <li> DRP is tested on a half-yearly basis; and the results are documented, and revisions are made, as necessary. </li> </ul> <h3>5.12. Compliance</h3> <ul> <li> Wingify has established a formal Compliance Policy and Procedure which addresses aspects of compliance required to be adhered to and fulfilled with respect to Wingify’s Information Security Policies. This policy also addresses the legal and compliance requirements pertaining to relevant statutory legislation, and contractual and regulatory obligations which Wingify is supposed to adhere to in order to protect its documents, records, and assets, thereby preventing the misuse of information processing facilities. Such efforts would help Wingify establish, maintain, and sustain the desired information security and privacy posture aligned with the Wingify strategic business plan, based on the best practices, standards, and principles. </li> <li> Wingify is committed to and conducts its business activities lawfully and in a manner that is consistent with its compliance obligations. The Legal and Regulatory Compliance (Compliance Policy) establishes the overarching principles and commitment to action for Wingify with respect to achieving compliance by: <ul> <li>Identifying a clear compliance framework within which Wingify operates.</li> <li>Promoting a consistent, rigorous, and comprehensive approach to compliance throughout Wingify. </li> <li>Developing and maintaining practices that facilitate and monitor compliance within Wingify.</li> <li>Seeking to ensure standards of good corporate governance, ethics, and community expectations.</li> <li>Engendering a culture of compliance where every person within Wingify accepts personal responsibility for compliance, and acts ethically and with integrity.</li> </ul> </li> <li> Wingify has been identifying all relevant regulatory and legislative requirements as per its contractual requirements and organization’s operational requirements and defining, documenting, and updating it on a regular basis. </li> <li> All records, as mandated by statutory/legal/regulatory authorities in India or of foreign origin, for which Wingify is responsible for compliance, will be protected from intentional or unintentional damage through natural causes. </li> <li> The retention limit of statutory records will be as mandated by the applicable legislation. However, for business records/documents, the business group heads and or HODs shall determine the retention limit with justification. </li> <li> Wingify will always seek to protect the privacy of the personal information of its customers, employees, and third parties with whom Wingify has signed the third-party agreement. Divulging of facts will be done only in keeping with statutory/contractual/regulatory/legal requirements. Such information will always be protected from getting misused, leaked, or falsified or traded with any interested party knowingly or unknowingly. </li> <li> Where logs are required to be maintained as per contractual/regulatory/statutory/legal requirement, these will be maintained for a specified duration. </li> <li> Data or records that are no longer required for business, legal, and/or regulatory purpose will be disposed of securely. </li> <li> Legal restrictions on the use of assets in respect of which there are IPRs (such as copyright, software license, trademarks, design rights, and others) will be complied with. </li> <li> Intellectual Property Rights of software programs, documentation and other information generated by or provided by Wingify users, consultants, and contractors for the benefit of Wingify, will be the property of Wingify. </li> <li> Intellectual Property Rights will be included in all contracts. </li> <li> Relevant statutory, regulatory, and contractual requirements for Wingify ’s information assets will be defined explicitly. Such requirements will include, but are not limited to: <ul> <li>Information Technology Laws (IT Act 2008/2011 Amended)</li> <li>Software Licensing Requirements</li> <li>Intellectual Property Rights (IPR) Laws</li> <li>Labor and General Employment Laws</li> <li>Health and Safety Laws</li> <li>Environmental Laws</li> </ul> </li> <li> As part of the information security audits by independent consultants or body, the appropriate confidentiality and non-disclosure agreements will be signed with them. And any access granted to the external shall be restricted immediately after completion of the audit. </li> <li> Compliance requirements are used to enforce a minimum level of security and privacy within Wingify. These are by no means a “finish line” for security and privacy. The primary compliance standards will be: <ul> <li>EU GDPR </li> <li>ISO 27701:2019</li> <li>ISO 27001:2013</li> </ul> </li> <li> Information Security Program: Wingify agrees to implement appropriate technical and organizational measures designed to protect Customer Personal Data, Employee and third-parties data, as required by the Applicable Data Protection Law(s). Further, Wingify agrees to regularly test, assess, and evaluate the effectiveness of its Information Security Program to ensure the security of the Processing. Wingify has comprehensive privacy and security assessments and certifications performed by regulatory or third parties. Such certifications include ISO 27001: 2013, ISO 27701: 2019 certifications. </li> <li> Any workforce member found to have violated this policy may be subject to disciplinary and/or legal action according to the Sanction policy. </li> </ul> <p class="policy-contact-info"> Please feel free to ask questions and share concerns with us at <a href="/cdn-cgi/l/email-protection#186b7d7b6d6a716c61586f71767f717e61367b777536"><span class="__cf_email__" data-cfemail="7704121402051e030e37001e19101e110e5914181a">[email&#160;protected]</span>.</a> </p> </div> </section> <footer class="page-footer"> <nav class="footer-nav"> <div class="container"> <a href="/" class="wingify-logo"></a> <div class="logo-wrapper"> <a href="https://vwo.com/" target="_blank"> <img src="https://wingify.com/wp-content/themes/wingify/images/vwo_logo_new.svg" class="vwo-logo" /> </a> </div> <div class="nav-item"> <div class="footer-security-logo fl clr"> <div class="security-logo"> <a href="https://vwo.com/compliance/gdpr/"> <img src="https://static.wingify.com/gcp/wp-content/themes/vwo/images/new-website/gdpr-compliant.svg" alt= "vwo gdpr ready badge" width= "94" height= "35" class= "W(a)" /> </a> </div> <div class="security-logo"> <a href="https://vwo.com/compliance/ccpa/"> <img src="https://static.wingify.com/gcp/wp-content/themes/vwo/images/new-website/ccpa-compliant.svg" alt= "VWO CCPA ready badge" width= "94" height= "37" class= "W(a) H(40px)" /> </a> </div> <div class="security-logo"> <a href="https://vwo.com/compliance/soc-2-type-ii/"> <img src="https://static.wingify.com/gcp/wp-content/themes/vwo/images/new-website/soc2typeII@2x.png" alt= "SOC 2 Type II Badge" width= "112" height= "47" class= "W(a) H(40px)" /> </a> </div> <div class="security-logo"> <a href="https://vwo.com/compliance/international-organization-standardization-certification/"> <img src="https://static.wingify.com/gcp/wp-content/themes/vwo/images/new-website/ISO-27001-certificate.svg" alt= "VWO ISO IEC 27001 Certification Badge" width= "125" height= "45" class= "W(a) H(40px)" /> </a> </div> <div class="security-logo"> <a href="https://vwo.com/compliance/international-organization-standardization-certification-27701/"> <img src="https://static.wingify.com/gcp/wp-content/themes/vwo/images/new-website/ISO-27701-certificate@2x.png?tr=w-0.5,h-0.5" srcset="https://static.wingify.com/gcp/wp-content/themes/vwo/images/new-website/ISO-27701-certificate@2x.png?tr=w-0.5,h-0.5 1x, https://static.wingify.com/gcp/wp-content/themes/vwo/images/new-website/ISO-27701-certificate@2x.png 2x" alt= "VWO ISO 27701 Certification Badge" width= "110" height= "56" class= "W(a) H(40px)"/> </a> </div> </div> <div class="social-icons-wrapper"> <a href="https://www.facebook.com/Wingify" target="_blank" class="icon facebook"></a> <a href="https://twitter.com/wingify" target="_blank" class="icon twitter"></a> <!--<a href="https://plus.google.com/116706810848094612186/about" class="icon gplus" target="_blank"></a>--> <a href="https://www.linkedin.com/company/wingify" target="_blank" class="icon linked-in"></a> <a href="https://github.com/wingify" class="icon github" target="_blank"></a> <a href="https://dribbble.com/wingify" target="_blank" class="icon dribble"></a> </div> </div> <div class="clr"></div> <div class="border-1px mt-40 mb-40"></div> <div class="nav-item"> <div class="links-wrapper"> <a href="https://wingify.com/careers" class="link">Careers</a> <a href="https://wingify.com/about" class="link">Team</a> <a href="https://wingify.com/contact" class="link">Contact Us</a> <a href="https://wingify.com/media-kit" class="link">Media Kit</a> </div> <div class="clr"></div> <ul> <li><a href="https://team.wingify.com/">Team Blog</a></li> <li><a href="https://engineering.wingify.com/">Engineering Blog</a></li> <li><a href="https://growth.wingify.com/">Wingify on Growth</a></li> <li><a href="https://wingify.com/downloads/wingify-corporate-social-responsibility-policy.pdf" target="_blank" >CSR Policy</a></li> <li><a href="https://wingify.earth" target="_blank" >Wingify Earth</a></li> <li><a href="https://wingify.com/information-security-policy">Security</a></li> <li><a href="https://wingify.com/privacy-policy">Privacy Policy</a></li> </ul> <div class="copyright nav-item"> <ul> <li><span>Copyright &copy; Wingify</span></li> </ul> </div> <div class="clr"></div> </div> <div class="clr"></div> </div> </nav> </footer> <svg xmlns="http://www.w3.org/2000/svg" style="display: none;"> <!-- Icon chevron down --> <symbol id="icon-chevron-down" viewBox="0 0 8 5"> <path d="M7.067 0L4 3.108.933 0 0 .946 4 5 8 .946z" fill="currentColor" fill-rule="evenodd"/> </symbol> <!-- //Icon chevron down --> <!-- Icon caret down --> <symbol id="icon-caret-down" viewBox="0 0 32 32"> <path fill="currentColor" fill-rule="evenodd" d="M5.61721639,10 L26.3828195,10 C27.8207013,10 28.540772,11.7030561 27.5240545,12.699055 L17.1412529,22.8702757 C16.5109994,23.4876859 15.4890364,23.4876859 14.8587829,22.8702757 L4.47598138,12.699055 C3.45918311,11.7030561 4.17933452,10 5.61721639,10 Z"></path> </symbol> <!-- // Icon caret down --> <!-- Icon arrow right --> <symbol id="icon-arrow-right" viewBox="0 0 9 9"> <path d="M3.742 1.503l2.154 2.08H.685A.685.685 0 0 0 0 4.271v.46c0 .381.305.688.685.688h5.211L3.742 7.5a.693.693 0 0 0-.012.985l.314.313a.68.68 0 0 0 .968 0L8.799 4.99a.69.69 0 0 0 0-.974L5.012.202a.68.68 0 0 0-.968 0L3.73.515a.696.696 0 0 0 .012.988z" fill="currentColor" fill-rule="nonzero"/> </symbol> <!-- //Icon arrow right --> <!-- Icon quote --> <symbol id="icon-quote" viewBox="0 0 24 21"> <path d="M.022 11.706C.072 5.816 1.474.472 10.074 0v4.698c-2.9 0-3.997 1.868-3.997 5.843l-.12.03h2.685c.786 0 1.428.601 1.428 1.335v7.76c0 .733-.642 1.334-1.428 1.334H1.428C.642 21 0 20.4 0 19.665v-7.759c0-.068.01-.135.022-.2zm13.926 0C13.998 5.816 15.401.472 24 0v4.698c-2.9 0-3.997 1.868-3.997 5.843l-.12.03h2.685c.786 0 1.428.601 1.428 1.335v7.76c0 .733-.642 1.334-1.428 1.334h-7.214c-.785 0-1.428-.6-1.428-1.335v-7.759c0-.068.011-.135.022-.2z" fill="currentColor" fill-rule="evenodd"/> </symbol> <!-- //Icon quote --> <!-- Icon play --> <symbol id="icon-play" viewBox="0 0 24 24"> <path d="M22.39 6C19.077.263 11.74-1.703 6 1.61.263 4.923-1.703 12.26 1.61 17.999c3.312 5.738 10.65 7.705 16.388 4.391C23.737 19.077 25.704 11.74 22.39 6zM16.8 20.313c-4.59 2.65-10.461 1.078-13.111-3.513C1.037 12.209 2.61 6.338 7.2 3.688 11.79 1.037 17.66 2.61 20.312 7.2c2.65 4.59 1.077 10.46-3.513 13.11zm-.48-8.8l-6.282-3.664c-.573-.334-1.035-.067-1.031.595l.032 7.273c.003.662.47.932 1.044.6l6.235-3.6c.573-.33.574-.87.002-1.204z" fill="currentColor" fill-rule="nonzero"/> </symbol> <!-- Icon menu --> <symbol id="icon-menu" viewBox="0 0 24 24"> <path d="M3 18h18v-2H3v2zm0-5h18v-2H3v2zm0-7v2h18V6H3z" fill="currentColor"/> </symbol> <!-- Icon close --> <symbol id="icon-close" viewBox="0 0 24 24"> <path d="M19 6.41L17.59 5 12 10.59 6.41 5 5 6.41 10.59 12 5 17.59 6.41 19 12 13.41 17.59 19 19 17.59 13.41 12z" fill="currentColor"/> </symbol> <!-- Icon search --> <symbol id="icon-search" viewBox="0 0 14 14"> <path d="M13.54 12.744l-3.389-3.463A5.572 5.572 0 0 0 11.5 5.649C11.5 2.534 8.92 0 5.75 0S0 2.534 0 5.65c0 3.114 2.58 5.648 5.75 5.648 1.19 0 2.325-.352 3.294-1.022l3.415 3.49a.75.75 0 0 0 .541.226c.195 0 .38-.073.52-.206a.729.729 0 0 0 .02-1.042zM5.75 1.474c2.344 0 4.25 1.873 4.25 4.175 0 2.303-1.906 4.176-4.25 4.176-2.344 0-4.25-1.873-4.25-4.176 0-2.302 1.906-4.175 4.25-4.175z" fill="currentColor" fill-rule="nonzero" /> </symbol> <!-- Icon checkbox --> <symbol id="icon-checkbox" viewBox="0 0 32 32"> <path fill="currentColor" fill-rule="evenodd" d="M3.2,0 L28.8,0 C30.5673112,-3.24649801e-16 32,1.4326888 32,3.2 L32,28.8 C32,30.5673112 30.5673112,32 28.8,32 L3.2,32 C1.4326888,32 -6.71745219e-16,30.5673112 -8.8817842e-16,28.8 L0,3.2 C-2.164332e-16,1.4326888 1.4326888,-5.63528619e-16 3.2,-8.8817842e-16 Z M7.22314486,17.595561 L12.1015146,23.010181 C12.3996624,23.3404198 12.9890243,23.6114453 13.4114447,23.6114453 L14.3064215,23.6114453 C14.7288419,23.6114453 15.3184705,23.3410089 15.616885,23.0107701 L25.9771203,11.5390229 C26.2752681,11.2087841 26.2742014,10.6696789 25.9744536,10.3406184 L24.0644943,8.2457674 C23.7647465,7.91670698 23.2756561,7.91847454 22.9772416,8.24871333 L14.4338943,17.7083902 C14.1357465,18.038629 13.6469228,18.0392181 13.347975,17.7095685 L10.2307573,14.2734354 C9.93180946,13.9437858 9.44271909,13.9437858 9.14403795,14.2740246 L7.22447826,16.3947998 C6.92579712,16.7244494 6.92499708,17.2653223 7.22314486,17.595561 Z"/> </symbol> <!-- Icon checkbox empty --> <symbol id="icon-checkbox-empty" viewBox="0 0 32 32"> <rect width="29.931" height="30" x="1" y="1" fill="white" stroke="currentColor" stroke-width="2" rx="3.2" /> </symbol> <!-- Icon share --> <symbol id="icon-share" viewBox="0 0 19 21"> <path d="M12.544 14.944l-5.524-3.22a3.911 3.911 0 0 0-.005-2.479l5.52-3.215c.656.893 1.692 1.472 2.853 1.472 1.98 0 3.595-1.681 3.595-3.75 0-2.07-1.612-3.752-3.595-3.752-1.984 0-3.595 1.682-3.595 3.751 0 .436.07.854.204 1.242L6.481 8.208c-.656-.897-1.691-1.472-2.852-1.472-1.98 0-3.596 1.681-3.596 3.75 0 2.07 1.616 3.752 3.6 3.752 1.16 0 2.196-.58 2.856-1.477l5.52 3.22a3.88 3.88 0 0 0-.208 1.25c0 2.065 1.612 3.752 3.595 3.752 1.984 0 3.596-1.682 3.596-3.752s-1.616-3.75-3.6-3.75c-1.157 0-2.188.574-2.848 1.463zM17.86 3.756c0 1.42-1.107 2.574-2.468 2.574s-2.468-1.154-2.468-2.574 1.11-2.575 2.468-2.575c1.361 0 2.468 1.154 2.468 2.575zm-16.695 6.73c0-1.42 1.107-2.574 2.468-2.574s2.468 1.155 2.468 2.575c0 1.42-1.11 2.575-2.468 2.575-1.361 0-2.468-1.155-2.468-2.575zm11.76 6.741c0-1.42 1.106-2.575 2.467-2.575s2.468 1.155 2.468 2.575c0 1.42-1.107 2.575-2.468 2.575s-2.468-1.155-2.468-2.575z" fill="currentColor" fill-rule="evenodd"/> </symbol> <!-- Icon checkmark --> <symbol id="icon-checkmark" viewBox="0 0 26 26"> <path d="M.3 14c-.2-.2-.3-.5-.3-.7s.1-.5.3-.7l1.4-1.4c.4-.4 1-.4 1.4 0l.1.1 5.5 5.9c.2.2.5.2.7 0L22.8 3.3h.1c.4-.4 1-.4 1.4 0l1.4 1.4c.4.4.4 1 0 1.4l-16 16.6c-.2.2-.4.3-.7.3-.3 0-.5-.1-.7-.3L.5 14.3.3 14z" fill="currentColor"/> </symbol> <symbol id="icon-question-mark" viewBox="0 0 32 32" fill="currentColor"> <g transform="translate(-190.000000, -428.000000)"><path d="M206,428 C197.163556,428 190,435.163111 190,444 C190,452.836889 197.163556,460 206,460 C214.836444,460 222,452.836889 222,444 C222,435.163111 214.836444,428 206,428 L206,428 Z M207.060444,453.565333 C206.585333,454.023556 205.930222,454.238222 205.192889,454.235556 C205.187111,454.236 205.181333,454.236 205.176,454.236 C204.473778,454.236 203.842222,454.015556 203.376444,453.566667 C202.9,453.116 202.662222,452.485333 202.666222,451.787556 C202.661778,451.090667 202.899556,450.46 203.379556,450.018222 C203.850222,449.576444 204.486222,449.361778 205.192444,449.364444 C205.927111,449.361778 206.578667,449.571556 207.056444,450.018222 C207.536444,450.46 207.774222,451.090667 207.769778,451.787556 C207.774667,452.485333 207.536889,453.116 207.060444,453.565333 L207.060444,453.565333 Z M211.342667,441.328444 C211.093333,441.947556 210.778667,442.484889 210.397333,442.933778 C210.029333,443.365778 209.624,443.748889 209.180889,444.080444 C208.782222,444.38 208.416889,444.699556 208.087556,445.035556 C207.771556,445.361333 207.502667,445.736 207.278667,446.169333 C207.078667,446.550222 206.963556,447.078222 206.963556,447.759111 L206.963556,448.203556 L203.632,448.203556 L203.227556,448.203556 L203.189333,447.801333 C203.159111,447.487556 203.143111,447.188444 203.143111,446.902222 C203.143111,446.328889 203.203111,445.807111 203.332444,445.34 C203.515556,444.668 203.771556,444.078222 204.105778,443.571556 C204.430222,443.080889 204.803556,442.649778 205.226222,442.283556 C205.614222,441.947111 205.974667,441.626222 206.308889,441.317333 C206.625778,441.026667 206.883556,440.727111 207.086667,440.421778 C207.258222,440.163111 207.348889,439.855556 207.351556,439.457778 C207.348,438.929778 207.212,438.575556 206.961333,438.302222 C206.766667,438.080889 206.292,437.895556 205.479111,437.899111 C205.233333,437.899111 204.967111,437.925333 204.680444,437.980444 C204.390667,438.038222 204.099556,438.119111 203.808889,438.223556 C203.513333,438.330222 203.231556,438.452444 202.964,438.591111 C202.691111,438.731111 202.451556,438.873778 202.244444,439.016 L201.829778,439.302667 L200.114667,436.008889 L200.44,435.786222 C201.135556,435.309778 201.931556,434.919556 202.823556,434.612889 C203.742667,434.298222 204.828,434.147111 206.077333,434.147111 C207.774667,434.145778 209.169778,434.561778 210.191111,435.438667 C211.211111,436.306667 211.732,437.528 211.725778,438.963556 C211.725778,439.887556 211.604444,440.674667 211.342667,441.328444 L211.342667,441.328444 Z"></path></g> </symbol> <symbol viewBox="0 0 14 14" id="icon-plus" fill="currentColor"> <path d="M13.24 6.023H7.977V.76C7.977.52 7.65 0 7 0s-.977.52-.977.76v5.263H.76C.52 6.023 0 6.35 0 7s.52.977.76.977h5.263v5.263c0 .24.326.76.977.76s.977-.52.977-.76V7.977h5.263c.24 0 .76-.326.76-.977s-.52-.977-.76-.977z" fill="currentColor" fill-rule="nonzero"/> </symbol> <symbol viewBox="0 0 21 17" id="icon-quote1" fill="currentColor"> <path d="M5.08442 17C4.14935 17 3.35065 16.8104 2.68831 16.4312C2.06494 16.052 1.55844 15.5254 1.16883 14.8513C0.779221 14.2193 0.487013 13.461 0.292208 12.5762C0.0974026 11.6493 0 10.7856 0 9.98513C0 7.87856 0.487013 5.96158 1.46104 4.2342C2.47403 2.46468 4.01299 1.05328 6.07792 0L6.6039 1.13755C5.47403 1.64312 4.48052 2.44362 3.62338 3.53903C2.80519 4.63445 2.31818 5.75093 2.16234 6.88847C2.04545 7.68897 2.06494 8.42627 2.22078 9.10037C3 8.25775 3.99351 7.83643 5.2013 7.83643C6.44805 7.83643 7.48052 8.23668 8.2987 9.03717C9.11688 9.83767 9.52597 10.9752 9.52597 12.4498C9.52597 13.798 9.0974 14.8934 8.24026 15.7361C7.38312 16.5787 6.33117 17 5.08442 17ZM16.4221 17C15.487 17 14.6883 16.8104 14.026 16.4312C13.4026 16.052 12.8961 15.5254 12.5065 14.8513C12.1169 14.2193 11.8247 13.461 11.6299 12.5762C11.4351 11.6493 11.3377 10.7856 11.3377 9.98513C11.3377 7.87856 11.8247 5.96158 12.7987 4.2342C13.8117 2.46468 15.3507 1.05328 17.4156 0L17.9416 1.13755C16.8117 1.64312 15.8182 2.44362 14.961 3.53903C14.1429 4.63445 13.6558 5.75093 13.5 6.88847C13.3831 7.68897 13.4026 8.42627 13.5584 9.10037C14.3377 8.25775 15.3312 7.83643 16.539 7.83643C17.7857 7.83643 18.8182 8.23668 19.6364 9.03717C20.4545 9.83767 20.8636 10.9752 20.8636 12.4498C20.8636 13.798 20.4351 14.8934 19.5779 15.7361C18.7208 16.5787 17.6688 17 16.4221 17Z" fill-rule="nonzero"/> </symbol> </svg> <!-- END: Footer --> <!-- Google Tag Manager --> <noscript> <iframe src="//www.googletagmanager.com/ns.html?id=GTM-5FDRGJ" height="0" width="0" style="display:none;visibility:hidden"></iframe> </noscript> <script data-cfasync="false" src="/cdn-cgi/scripts/5c5dd728/cloudflare-static/email-decode.min.js"></script><script nonce="EROdgveJbp2AV02DIMwekXSVBNsGHVXW">(function (w, d, s, l, i) { w[l] = w[l] || []; w[l].push({'gtm.start': new Date().getTime(), event: 'gtm.js'}); /* eslint-disable-next-line no-var */ var f = d.getElementsByTagName(s)[0],j = d.createElement(s),dl = l != 'dataLayer' ? '&l=' + l : ''; j.async = true; j.src = '//www.googletagmanager.com/gtm.js?id=' + i + dl; f.parentNode.insertBefore(j, f); })(window, document, 'script', 'dataLayer', 'GTM-5FDRGJ');</script> <!-- End Google Tag Manager --> <!-- OneTrust Cookies Consent Notice start for wingify.com --> <script nonce="EROdgveJbp2AV02DIMwekXSVBNsGHVXW" type="text/javascript" src="https://cdn.cookielaw.org/consent/2e8e9622-176d-4f09-b346-9a6b8e00251d/OtAutoBlock.js" ></script> <script nonce="EROdgveJbp2AV02DIMwekXSVBNsGHVXW" src="https://cdn.cookielaw.org/scripttemplates/otSDKStub.js" type="text/javascript" charset="UTF-8" data-domain-script="2e8e9622-176d-4f09-b346-9a6b8e00251d" ></script> <script nonce="EROdgveJbp2AV02DIMwekXSVBNsGHVXW" type="text/javascript"> //eslint-disable-next-line function OptanonWrapper() { } </script> <!-- OneTrust Cookies Consent Notice end for wingify.com --> <script nonce="EROdgveJbp2AV02DIMwekXSVBNsGHVXW" type="text/javascript" src="//research.vwo.com/js/forms2/js/forms2.min.js?ver=6.7.2" id="marketo-form-js"></script> <script nonce="EROdgveJbp2AV02DIMwekXSVBNsGHVXW" type="text/javascript" src="https://wingify.com/wp-content/cache/autoptimize/7/js/autoptimize_single_e2baeeae85be84a1a27afc51eea10038.js?ver=6.7.2" id="jquery-js"></script> <script nonce="EROdgveJbp2AV02DIMwekXSVBNsGHVXW" type="text/javascript" id="main-js-extra"> /* <![CDATA[ */ var siteVar = {"ajaxUrl":"https:\/\/wingify.com\/wp-admin\/admin-ajax.php","postId":"20","siteUrl":"https:\/\/wingify.com"}; /* ]]> */ </script> <script nonce="EROdgveJbp2AV02DIMwekXSVBNsGHVXW" type="text/javascript" src="https://wingify.com/wp-content/cache/autoptimize/7/js/autoptimize_single_b1b332bf8dce1fe13393d6e632a0bf55.js?ver=6.7.2" id="main-js"></script> <script nonce="EROdgveJbp2AV02DIMwekXSVBNsGHVXW"> console.log("%cWARNING!", "color: red; background: yellow; font-size: 24px;"); console.log("%cThis section is intended for developers only. Do not enter or paste code that you do not understand. If someone told you to copy and paste something, kindly report this to security@wingify.com.", "font-size: 18px;"); </script> </body> </html> <!-- Dynamic page generated in 0.308 seconds. --> <!-- Cached page generated by WP-Super-Cache on 2025-03-27 20:41:34 --> <!-- super cache -->

Pages: 1 2 3 4 5 6 7 8 9 10